General
-
Target
5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9
-
Size
5.0MB
-
Sample
240527-p8d4fsee33
-
MD5
565346a9c4918db105a2f4194f073799
-
SHA1
0b84e69da43c075ae1ead56eb41c3ab1f7283cbd
-
SHA256
5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9
-
SHA512
9135ecce2c0468089893d750d26e90155c6dea5ac8767a624127fcf8276f4b4b878ae01aa65828e0390cf5075e15b3b90dd62e0a1d0c93a9550b6c437e957237
-
SSDEEP
24576:kF91qyLvDkqTbwbJVEiddwzF1yznjfJHM/9EVwddPOgh4C2mLUGUBsxsRwxqDKF:kNzLIq/wnEQdYF1g8oBsxsRwxqDy
Static task
static1
Behavioral task
behavioral1
Sample
5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9
-
Size
5.0MB
-
MD5
565346a9c4918db105a2f4194f073799
-
SHA1
0b84e69da43c075ae1ead56eb41c3ab1f7283cbd
-
SHA256
5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9
-
SHA512
9135ecce2c0468089893d750d26e90155c6dea5ac8767a624127fcf8276f4b4b878ae01aa65828e0390cf5075e15b3b90dd62e0a1d0c93a9550b6c437e957237
-
SSDEEP
24576:kF91qyLvDkqTbwbJVEiddwzF1yznjfJHM/9EVwddPOgh4C2mLUGUBsxsRwxqDKF:kNzLIq/wnEQdYF1g8oBsxsRwxqDy
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5